Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


March Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the March 2023 Edition of the journal. The last date of research paper submission is February 15, 2023.

Hybrid HMAC using improved SHA-512

Pratik Kanani, Kamal Shah, Vikas Kaul, Bhushan Nemade Published in Advanced Computing

IJAIS Proceedings on International Conference and workshop on Advanced Computing 2014
Year of Publication: 2014
© 2014 by IJAIS Journal
Download full text
  1. Pratik Kanani, Kamal Shah, Vikas Kaul and Bhushan Nemade. Article: Hybrid HMAC using improved SHA-512. IJAIS Proceedings on International Conference and workshop on Advanced Computing 2014 ICWAC 2014(2):31-35, June 2014. BibTeX

    	author = "Pratik Kanani and Kamal Shah and Vikas Kaul and Bhushan Nemade",
    	title = "Article: Hybrid HMAC using improved SHA-512",
    	journal = "IJAIS Proceedings on International Conference and workshop on Advanced Computing 2014",
    	year = 2014,
    	volume = "ICWAC 2014",
    	number = 2,
    	pages = "31-35",
    	month = "June",
    	note = "Published by Foundation of Computer Science, New York, USA"


With the fast progression of digital data exchange in electronic way, information security is becoming more important in data storage and transmission. Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks. The confidentiality, Integrity and Availability are the three main goals of Information Security. To protect Confidentiality and Integrity of the message, key mechanisms and Hash functions are used. This paper proposes a novel scheme, which computes Hybrid HMAC based on improved SHA-512 algorithm. The proposed system gives a constant output of 512 bits for any input length of data and generates HMAC using multiple available keys. Paper also provides a method for reducing the time taken by traditional HMAC functions and increases complexity of SHA-512.


  1. Secure Hash Algorithm, Wikipedia (access on 10 January 2014) http://en. wikipedia. org/wiki/Secure_Hash_Algorithm
  2. William Stallings, Cryptography and Network Security : Principles and Practice , fifth Edition, Prentice hall.
  3. S. Gueron, S. Johnson and J. Walker, "SHA-512/256", IEEE Conference on IT:new Generations, pp. 354-358, 2011.
  4. BigDecimal and BigInteger, Stackoverflow (access on 20 January 2014) http://stackoverflow. com/search?q=bigdecimal+and+biginteger
  5. Java Optimization Rules, Appperfect (access on 22 January 2014) http://www. appperfect. com/support/java-coding-rules/optimization. html
  6. A. Mandal and A. Tiwari, "Analysis of Avalanche Effect in Plaintext of DES using Binary codes", International Journal of Emerging Trnds and Technology in Computer Science, vol. 1 , pp. 166-171, 2012.
  7. String Similarity test, Tools4noobs (access on 2 February 2014) http://www. tools4noobs. com/online_tools/String-similarity


HMAC, SHA-512, Modified SHA-512, Avalanche effect, Buffers.